Implementation for Quick Response Code

Authors

  • K. Ravikumar  Assistant Professor, Department of Computer Science, Tamil University, Thanjavur, Tamil Nadu, India
  • R. Geetha  Department of Computer Science, Tamil University, Thanjavur, Tamil Nadu, India

DOI:

https://doi.org//10.32628/IJSRST196642

Keywords:

Quick Response, Cyber-Physical Networked Systems, MAC, PCREF, Key Generation Center, Send Data Storing Center

Abstract

Quick Response (QR) codes are versatile. a chunk of long trilingual text, a connected URL, an automatic SMS message, an identity card or simply regarding any data is embedded into the two-dimensional barcode. as well as moderate equipped mobile devices, QR Codes will connect the users to the data quickly and simply. The operations to retrieve or store QR codes are unbelievably easy and fast, and with mobile devices, build them the best academic tools for teaching and learning. QR codes are all over and most of the people have mobile phones equipped with QR code readers. though QR codes existed for over fifteen years, there arent such a lot of analysis applications during this space.

References

  1. A. Lewko, A. Sahai, B. Waters , ”Revocation Systems with Very Small Private Keys” ,Proc. IEEE Symposium on Security and Privacy 2010, pp. 273–285, 2017.
  2. A. Boldyreva, V. Goyal, V. Kumar, ”Identity-Based Encryption with Efficient Revocation” , Proc. ACM Conference on Computer and Communications Security 2008, pp. 417–426, 2017
  3. L. Cheung, C. Newport, ”Provably Secure Ciphertext Policy ABE” ,ACM Conference on Computer and Communications Security, pp. 456–465, 2017.
  4. L.Ibraimi, M. Petkovic, S. Nikova, P. Hartel, W. Jonker, ”Mediated Ciphertext- Policy Attribute-Based Encryption and Its Application” , Proc. WISA 2009, LNCS 5932, pp. 309–323, 2016.
  5. S. Yu, C. Wang, K. Ren, W. Lou, ”Attribute Based Data Sharing with Attribute Revocation”, Proc. ASIACCS ’10, 2015.
  6. Suppat Rungraungsilp, Mahasak Ketcham, Virutt Kosolvijak, and Sartid Vongpradhip, “Data hiding method for QR code based on watermark by compare DCT with DFT domain?”, International Conference on Computer and Communication Technologies (ICCCT'2012), May 26-27, 2012.
  7. Kuan-Chieh Liao, “A novel user authentication scheme based on QR-code”, Journal of networks, vol. 5, no. 8, August 2010.

Downloads

Published

2019-12-30

Issue

Section

Research Articles

How to Cite

[1]
K. Ravikumar, R. Geetha, " Implementation for Quick Response Code, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 6, Issue 6, pp.249-252, November-December-2019. Available at doi : https://doi.org/10.32628/IJSRST196642